Quantifying Phishing Susceptibility for Detection and Behavior Decisions

被引:92
作者
Canfield, Casey Inez [1 ]
Fischhoff, Baruch [1 ,2 ]
Davis, Alex [1 ]
机构
[1] Carnegie Mellon Univ, Dept Engn & Publ Policy, Pittsburgh, PA 15213 USA
[2] Carnegie Mellon Univ, Dept Social & Decis Sci, Pittsburgh, PA 15213 USA
基金
美国国家科学基金会; 美国安德鲁·梅隆基金会;
关键词
signal detection theory; cybersecurity; vigilance; perception-action; metacognition; SIGNAL-DETECTION-THEORY; VISUAL-SEARCH; VIGILANCE; OVERCONFIDENCE; SCIENCE; SYSTEM; MODEL; USERS;
D O I
10.1177/0018720816665025
中图分类号
B84 [心理学]; C [社会科学总论]; Q98 [人类学];
学科分类号
03 ; 0303 ; 030303 ; 04 ; 0402 ;
摘要
Objective: We use signal detection theory to measure vulnerability to phishing attacks, including variation in performance across task conditions. Background: Phishing attacks are difficult to prevent with technology alone, as long as technology is operated by people. Those responsible for managing security risks must understand user decision making in order to create and evaluate potential solutions. Method: Using a scenario-based online task, we performed two experiments comparing performance on two tasks: detection, deciding whether an e-mail is phishing, and behavior, deciding what to do with an e-mail. In Experiment 1, we manipulated the order of the tasks and notification of the phishing base rate. In Experiment 2, we varied which task participants performed. Results: In both experiments, despite exhibiting cautious behavior, participants' limited detection ability left them vulnerable to phishing attacks. Greater sensitivity was positively correlated with confidence. Greater willingness to treat e-mails as legitimate was negatively correlated with perceived consequences from their actions and positively correlated with confidence. These patterns were robust across experimental conditions. Conclusion: Phishing-related decisions are sensitive to individuals' detection ability, response bias, confidence, and perception of consequences. Performance differs when people evaluate messages or respond to them but not when their task varies in other ways. Application: Based on these results, potential interventions include providing users with feedback on their abilities and information about the consequences of phishing, perhaps targeting those with the worst performance. Signal detection methods offer system operators quantitative assessments of the impacts of interventions and their residual vulnerability.
引用
收藏
页码:1158 / 1172
页数:15
相关论文
共 56 条
  • [1] [Anonymous], 2006, P SIGCHI C HUM FACT, DOI 10.1145/1124772.1124861
  • [2] [Anonymous], 1970, Mathematical psychology: An elementary introduction
  • [3] [Anonymous], 2007, P 3 S US PRIV SEC, DOI DOI 10.1145/1280680.1280692
  • [4] Computerized assessment of sustained attention: A review of factors affecting vigilance performance
    Ballard, JC
    [J]. JOURNAL OF CLINICAL AND EXPERIMENTAL NEUROPSYCHOLOGY, 1996, 18 (06) : 843 - 863
  • [5] Boyce M.W., 2011, P HUMAN FACTORS ERGO, V55, P1115, DOI DOI 10.1177/1071181311551233
  • [6] Reducing online identity disclosure using warnings
    Carpenter, Sandra
    Zhu, Feng
    Kolimi, Swapna
    [J]. APPLIED ERGONOMICS, 2014, 45 (05) : 1337 - 1342
  • [7] CERT Insider Threat Team, 2013, CMUSEI2013TN022 CERT
  • [8] Cranor L. F., 2008, A framework for reasoning about the human in the loop
  • [9] Evaluating Amazon's Mechanical Turk as a Tool for Experimental Behavioral Research
    Crump, Matthew J. C.
    McDonnell, John V.
    Gureckis, Todd M.
    [J]. PLOS ONE, 2013, 8 (03):
  • [10] It won't happen to me: Promoting secure behaviour among internet users
    Davinson, Nicola
    Sillence, Elizabeth
    [J]. COMPUTERS IN HUMAN BEHAVIOR, 2010, 26 (06) : 1739 - 1747